Wireless NetworkingEssay Preview: Wireless NetworkingReport this essayWireless NetworkingA Brief HistoryThe history of wireless networking stretches farther back than you might think. It was over fifty years ago, during World War II, when the United States Army first used radio signals for data transmission. They developed a radio data transmission technology, which was heavily encrypted. It was used quite extensively throughout the campaign with the US and her allies. This inspired a group of researchers in 1971 at the University of Hawaii to create the first packet based radio communications network. ALOHNET, as it was named, was essentially the very first wireless local area network (WLAN). This first WLAN consisted of 7 computers that communicated in a bi-directional star topology (see
A brief history here.
The U.S. and allies were also using radio signals to transmit information directly to each other, so that more of the information could be transmitted to other sites. But one key difference to wireless was that we were using signal processing as well.
Radio Frequency Information
In the 1950s, this technology was used to broadcast information to military targets in Europe, including targets located in Western Europe.
For example, on Feb. 2, 1957, North and Central France had launched a joint press conference by announcing the discovery of what they believed to be a massive underground volcano in the Algiers region of Algeria. The information about this massive eruption was leaked to the press by the French and Algerian governments, and for over a decade, it has remained a secret.
As the Soviets and Americans developed the theory of nuclear-powered nuclear reactors around the time of WWII, this technology was not a new idea. The Soviet Union employed a device called “the B-51 radio” that was first introduced about two weeks ago. The B-51 system has not been updated since then, and has received great development efforts such as the B-1 satellite as a ground-based communications link. As far as we know, the B2 radar system is still in use today, along with B2A radar. The B-2 receiver on many of the U.S. and European satellites is built on the B-52 radar, which receives information on several wavelengths of electromagnetic energy, and receives low-power data pulses over this wavelength.
The first WLNC, an amateur radio station in Southern California, was established in 1965. Later, as soon as the U.S. government established a national broadcasting station in the late 1960s, the Federal Communications Commission proposed that the agency also establish a national radio station. Because of this proposal, the Federal Communications Commission established the National Radio Standards Organization (NRAO) between 1965 and 1984. NRAO’s initial mandate was to be to provide high fidelity information on local, regional, and international radio frequency frequencies, information which was acceptable for broadcasting purposes. While radio communications were not always available at this time, the NRAO made the most of public interest and the availability of the radio technology.
As with the B-51 system, there was no radio communication system for the United Nations. The UN used its various resources to promote its own national radio coverage, and some programs such as the World War II Broadcast System and broadcast service were broadcast to all the nations across the world. Although the U.N. has been criticized, the UN’s mandate to disseminate its message in international languages has been interpreted as the cornerstone of its international broadcasting program.
The United Nations and the World Broadcasting Association (WBNA) are jointly funded by several governments. The WBNA is also sponsored by the following major organizations (note the abbreviation “wbnaiin”) that have influence in political debate:
UN
U.S. Government Agency for International Development (USAID)
International Broadcasting Bureau (IBB)
International Telecommunications Union (IPIU)
While wired LANs have wholly dominated the networking market, the last few years show a rise in wireless networking usage. This can best be seen in academic circles (i.e. University campuses), health-care, manufacturing, and warehousing. All the while, the technology is improving, making it easier and cheaper from companies to go wireless
Wireless Network TopologiesTopology: The physical (real) or logical (virtual) arrangement of elements.In our case, this refers to the arrangement of nodes (i.e. computers, network printers, servers, etc.) in which the network is connected. There are five major topologies in use today in wired networks: Bus, Ring, Star, Tree, and Mesh, but only two make sense in a wireless environment. These include the star and mesh topologies.
The star topology, which happens to be in widest use today, describes a network in which there is one central base station or Access Point (AP) for communication. The information packets transmitted by the originating node and are received by the central station and routed to the proper wireless destination node.
This station can then be a bridge to a wired LAN giving access to other wired clients, the Internet, other network devices, and etc. From our review system, Compexs SoftBridge program provides a “software bridge” to wired clients and services without specialized hardware or AP. With this software, any computer that is connected to the wired network and has a wireless Network Interface Card (NIC) can act as the bridge.
The mesh topology is a slightly different type of network architecture than the star topology, except that there is no centralized base station. Each node that is in range of one another can communicate freely.
IEEE 802.11, 802.11a, and 802.11bIn order for WLANs to be widely accepted, there needed to be an industry standard devised to ensure the compatibility and reliability among all manufacturers of the devices. The Institute of Electrical and Electronics Engineers (IEEE) has provided just that. The original standard IEEE 802.11 was defined as a standard in 1997 followed by IEEE 802.11a and IEEE 802.11b in September of 1999. The original standard operates at a radio frequency (RF) band that surrounds 2.4GHz and provides for data rates of 1Mbps and 2Mbps and a set of fundamental signaling methods and services. The IEEE 802.11a and IEEE 802.11b standards are defined at bands of 5.8GHz and 2.4GHz, respectively. The two additions also define new Physical (PHY) layers for data rates from 5Mbps, 11Mbps, to 54Mbps with IEEE 802.11a. These standards operate in what is known as the Industrial, Scientific, and Medical (ISM) frequency bands. The typical bands are 902-928MHz (26MHz available bandwidth), 2.4-2.4835 GHz (83.5 MHz available), and 5.725-5.850 GHz (125MHz available), with the latter allowing for IEEE 802.11as higher data rate.
The standard defines the PHY and Media Access Control (MAC) layers for the wireless communication. A layer is simply a group of related functions that are separate from another layer of related functions. The layers in our wireless networking scenario can be best understood in the following analogy. Consider moving a book (representing a data packet) from a shelf on one side of the room to the desk on the other. Well, the MAC layer can be thought of as how one picks up the book and the PHY layer is how you walk across the room.
The PHY layer as defined by the standard includes two different types of radio frequency (RF) communication modulation schemes: Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS). Both types were designed by the military for reliability, integrity, and security. Both types have their own unique way of transmitting data.
FHSS works by splitting the available frequency band into several channels. It uses a narrow band carrier wave that continuously changes in a 2-4 level Gaussian Frequency Shift Keying (GFSK) sequence. In other words, the frequency of transmission changes in a pseudorandom manner that is known by the sending and receiving nodes. This builds into the layer a decent bit of security. A hacker would generally not know the next frequency to switch to receive the entire signal. One advantage to FHSS is that it allows for multiple networks to coexist in the same physical space.
IEEE 802.11, 802.11a, and 802.11b, ContinuedDSSS works in a different manner altogether. DSSS combines the data stream with a higher speed digital code. Each data bit is mapped into a common pattern of bits known only to the transmitter and the intended receiver. This bit pattern is called a chipping code. This code is a random sequence of high and low signals that signify the actual bit. This chipping code is inverted to represent the opposite bit in the data sequence. This frequency modulation, if the transmission is properly synchronized, offers its own error correction, and thusly has a higher tolerance for interference.
The MAC layer defines a way of accessing the physical layer and also controls the services related to the mobility management and the radio resource. It is similar to the wired Ethernet standard for data transmission. The differences arise in the way data collisions are handled. In the wired standard, data packets are sent out to the network indiscriminately. Only when two packets in a sense “collide”